Login / Signup

An assessment of VoIP covert channel threats.

Takehiro TakahashiWenke Lee
Published in: SecureComm (2007)
Keyphrases
  • covert channel
  • security requirements
  • countermeasures
  • network architecture
  • quality of service
  • information security
  • knowledge discovery
  • case study
  • data processing
  • denial of service attacks